Andreas Jacobsson

Learn More
Personal privacy is affected by the occurrence of adware and spyware in peer-to-peer tools. In an experiment, we investigated five file-sharing tools and found that they all contained ad-/spyware programs, and, that these hidden components communicated with several servers on the Internet. Although there was no exchange of files by way of the file-sharing(More)
The amount of software that hosts spyware has increased dramatically. To avoid legal repercussions, the vendors need to inform users about inclusion of spyware via end user license agreements (EULAs) during the installation of an application. However, this information is intentionally written in a way that is hard for users to comprehend. We investigate how(More)
The significance of electronic information exchange in inter-organizational cooperation is well-known. We will here focus on the particular requirements of SMEs. We describe a general " wrapper agent " solution based on open source freeware that makes it possible (in principle) for any business system to exchange information with any other business system.(More)
Several barriers to turn innovative ideas into growth-oriented businesses with a global outlook are identified. The Plug and Play Business concept is suggested to lower these barriers by making it possible for the innovator to plug into a network of actors or potential collaborators with automated entrepreneurial functions. A P2P paradigm with intelligent(More)
i Abstract Exploring privacy risks in information networks is analysing the dangers and hazards that are related to personal information about users of a network. It is about investigating the dynamics and complexities of a setting where humans are served by technology in order to exploit the network for their own good. In the information network, malicious(More)
1 On the Internet, digitally active small and medium sized enterprises (SME) face numerous security risks. When SMEs join networks, business ideas and malicious activities may interfuse. E-mail marketing, remote control and information gathering are replaced by spam, virulent programs and spyware. In this paper, we use the concepts of information ecosystems(More)
We investigate the hypothesis that it is possible to detect from the End User License Agreement (EULA) if the associated software hosts spyware. We apply 15 learning algorithms on a data set consisting of 100 applications with classified EULAs. The results show that 13 algorithms are significantly more accurate than random guessing. Thus, we conclude that(More)